775 Result(s)
-
Chapter and Conference Paper
Camera calibration based on 3D-point-grid
In this paper an effective technique of camera calibration based on a 3D-point-grid is presented. The properties of structured space points, defined as 3D-point-grid, and their relations under perspective tran...
-
Chapter and Conference Paper
Bézier Volume Deformation Model for Facial Animation and Video Tracking
Capturing real motions from video sequences is a powerful approach to automatically build facial deformation model. In this paper, a 3D Bézier volume deformation model is proposed for both synthesis and analys...
-
Chapter and Conference Paper
Explosive Impact on Real-time
In this paper, we describe methods for real-time modelling explosions and their impacts on realistic deformable terrains. Our simulation method elaborates a strength and damage model for terrain ma...
-
Chapter and Conference Paper
Tunnelling Descent: A New Algorithm for Active Contour Segmentation of Ultrasound Images
The presence of speckle in ultrasound images makes it hard to segment them using active contours. Speckle causes the energy function of the active contours to have many local minima, and the gradient descent p...
-
Chapter and Conference Paper
Rough Fuzzy Integrals for Information Fusion and Classification
This paper presents two extended fuzzy integrals under rough uncertainty, i.e. rough upper fuzzy and lower fuzzy integrals, and extended properties are also given. Furthermore, these two integrals are applied ...
-
Chapter and Conference Paper
Clustering XML Documents by Structure
This work explores the application of clustering methods for grou** structurally similar XML documents. Modeling the XML documents as rooted ordered labeled trees, we apply clustering algorithms using distan...
-
Chapter and Conference Paper
Bi-phase Encoded Waveform Design to Deal with the Range Ambiguities for Sparse Space-Based Radar Systems
In order to mitigate the Range-Doppler ambiguities inherent in a sparse aperture, high pulse repetition frequency is adopted to resolve Doppler ambiguous and waveform approach exploits temporal diversity to re...
-
Chapter and Conference Paper
A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls
Intrusion detection has emerged as an important technique for network security. Due to the complex and dynamic properties of intrusion behaviors, machine learning and data mining methods have been widely emplo...
-
Chapter and Conference Paper
Replay Scene Based Sports Video Abstraction
Video abstraction can be useful in multimedia database indexing and querying and can illustrate the important content of a longer video to quick browsing. Further, in sports video, replay scene often demonstra...
-
Chapter and Conference Paper
One-Point Hexagonal Inner Search for Fast Motion Estimation
In this paper, we propose a novel inner search algorithm for fast motion estimation to speed up the coding of video compression. The proposed algorithm, called as one-point hexagonal inner search (OPHIS), is b...
-
Chapter and Conference Paper
A Hybrid GMM and Codebook Map** Method for Spectral Conversion
This paper proposes a new map** method combining GMM and codebook map** methods to transform spectral envelope for voice conversion system. After analyzing overly smoothing problem of GMM map** method in...
-
Chapter and Conference Paper
A Similarity Computing Algorithm for Volumetric Data Sets
Recently, there are remarkable progress in similarity computing for 3D geometric models. Few focus is put on the research of the similarity between volumetric models. This paper proposes a novel approach for p...
-
Chapter and Conference Paper
Text Similarity Computing Based on Standard Deviation
Automatic text categorization is defined as the task to assign free text documents to one or more predefined categories based on their content. Classical method for computing text similarity is to calculate th...
-
Chapter and Conference Paper
Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches
This paper introduces the combined fuzzy-based approaches to detect the anomalous network traffic such as DoS/DDoS or probing attacks, which include Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy C-Means...
-
Chapter and Conference Paper
A Weather Forecast System Based on Artificial Immune System
Inspired by the learning mechanism of the biological immune system, the paper presents a method for weather forecast. Expressions of antigen and B-cell are defined. An immune-based supervised learning algorith...
-
Chapter and Conference Paper
Exploring Content-Based and Image-Based Features for Nude Image Detection
This paper introduces some widely used techniques related to nude image detection. By analyzing the merits and drawbacks of these techniques, a new nude image detection method is proposed. The proposed approac...
-
Chapter and Conference Paper
Personalized Facial Animation Based on 3D Model Fitting from Two Orthogonal Face Images
In this paper, a personalized MPEG-4 compliant facial animation system in embedded platform is presented. We report a semi-automatic and rapid approach for personalized modeling from two orthogonal face images...
-
Chapter and Conference Paper
Comparison of Complexity and Regularity of ERP Recordings Between Single and Dual Tasks Using Sample Entropy Algorithm
The purpose of this study is to investigate the application of sample entropy (SampEn) measures to electrophysiological studies of single and dual tasking performance. The complexity of short-duration (~s) epo...
-
Chapter and Conference Paper
Compact and Robust Fingerprints Using DCT Coefficients of Key Blocks
In this paper, we present a novel fingerprinting method for image authentication, the fingerprint length of which is very short (only 81 bytes) and independent on image sizes. First, we extract features based ...
-
Chapter and Conference Paper
Using the Fast Marching Method to Extract Curves with Given Global Properties
Curves are often used as anatomical features to match surfaces that represent biological objects, such as the human brain. Automated and semi-automated methods for extracting these curves usually rely on local...